Compliance with bring your own device security policies in organizations: A systematic literature review
The omnipresence of Bring Your Own Device (BYOD) in organizations and employees' lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Elsevier
2020
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/36310/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.36310 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.363102023-10-06T00:50:17Z http://eprints.um.edu.my/36310/ Compliance with bring your own device security policies in organizations: A systematic literature review Palanisamy, Rathika Norman, Azah Anir Kiah, Miss Laiha Mat QA75 Electronic computers. Computer science The omnipresence of Bring Your Own Device (BYOD) in organizations and employees' lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secure environment in organizations. Though research on BYOD has progressed, the field still lacks a systematic literature analysis, as previous reviews have focused on traditional computing security policy compliance, leaving out the BYOD environment. A total of 21 articles published from 2012 to 2019 were reviewed systematically to answer a formulated set of research questions. The study reveals the unique features of the BYOD computing environment in organizations. This review provides an overview of the theories used to explain and predict security behaviors in this field and a detailed understanding of factors that influence BYOD security policy compliance behavior. Literature gaps for further research are proposed in this paper to present new insights in this field of research. Studies on BYOD security policy compliance remain scarce, which makes this review a novel contribution to human security behavioral studies. (c) 2020 Elsevier Ltd. All rights reserved. Elsevier 2020-11 Article PeerReviewed Palanisamy, Rathika and Norman, Azah Anir and Kiah, Miss Laiha Mat (2020) Compliance with bring your own device security policies in organizations: A systematic literature review. Computers & Security, 98. ISSN 0167-4048, DOI https://doi.org/10.1016/j.cose.2020.101998 <https://doi.org/10.1016/j.cose.2020.101998>. 10.1016/j.cose.2020.101998 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Palanisamy, Rathika Norman, Azah Anir Kiah, Miss Laiha Mat Compliance with bring your own device security policies in organizations: A systematic literature review |
description |
The omnipresence of Bring Your Own Device (BYOD) in organizations and employees' lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secure environment in organizations. Though research on BYOD has progressed, the field still lacks a systematic literature analysis, as previous reviews have focused on traditional computing security policy compliance, leaving out the BYOD environment. A total of 21 articles published from 2012 to 2019 were reviewed systematically to answer a formulated set of research questions. The study reveals the unique features of the BYOD computing environment in organizations. This review provides an overview of the theories used to explain and predict security behaviors in this field and a detailed understanding of factors that influence BYOD security policy compliance behavior. Literature gaps for further research are proposed in this paper to present new insights in this field of research. Studies on BYOD security policy compliance remain scarce, which makes this review a novel contribution to human security behavioral studies. (c) 2020 Elsevier Ltd. All rights reserved. |
format |
Article |
author |
Palanisamy, Rathika Norman, Azah Anir Kiah, Miss Laiha Mat |
author_facet |
Palanisamy, Rathika Norman, Azah Anir Kiah, Miss Laiha Mat |
author_sort |
Palanisamy, Rathika |
title |
Compliance with bring your own device security policies in organizations: A systematic literature review |
title_short |
Compliance with bring your own device security policies in organizations: A systematic literature review |
title_full |
Compliance with bring your own device security policies in organizations: A systematic literature review |
title_fullStr |
Compliance with bring your own device security policies in organizations: A systematic literature review |
title_full_unstemmed |
Compliance with bring your own device security policies in organizations: A systematic literature review |
title_sort |
compliance with bring your own device security policies in organizations: a systematic literature review |
publisher |
Elsevier |
publishDate |
2020 |
url |
http://eprints.um.edu.my/36310/ |
_version_ |
1781704494395949056 |
score |
13.160551 |